CVE-2025-15115: Missing Authorization in Petlibrio Smart Pet Feeder Platform
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers can send requests to /member/auth/thirdLogin with arbitrary Google IDs and phoneBrand parameters to obtain full session tokens and account access without proper OAuth verification.
AI Analysis
Technical Summary
CVE-2025-15115 identifies a critical security weakness in the Petlibro Smart Pet Feeder Platform's social login OAuth implementation. The vulnerability arises from improper validation of OAuth tokens during third-party authentication via Google accounts. Specifically, the endpoint /member/auth/thirdLogin accepts requests containing Google IDs and phoneBrand parameters without verifying the authenticity of the OAuth tokens. This flaw allows an attacker to impersonate any user by submitting arbitrary Google IDs, bypassing the intended authorization checks. Consequently, the attacker receives valid session tokens granting full access to the victim's account, including control over the smart pet feeder device and access to any personal data stored within the platform. The vulnerability affects all versions up to 1.7.31, with no patch currently available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on confidentiality and integrity (VC:L, VI:L), resulting in a medium severity rating of 6.9. No known exploits have been reported in the wild, but the ease of exploitation and potential for unauthorized access make this a significant threat to users. The flaw undermines the trust model of OAuth-based social login, a common authentication mechanism in IoT platforms, highlighting the importance of robust token validation. Given the increasing integration of IoT devices in consumer environments, exploitation could lead to privacy breaches and unauthorized device manipulation.
Potential Impact
For European organizations and consumers using the Petlibro Smart Pet Feeder Platform, this vulnerability could lead to unauthorized account takeovers without requiring any authentication or user interaction. Attackers gaining access to user accounts can manipulate device settings, potentially disrupting pet feeding schedules or causing device malfunctions. Additionally, attackers may access personal user information stored in the platform, leading to privacy violations. While the direct operational impact on critical infrastructure is low, the compromise of consumer IoT devices can erode user trust and expose organizations managing these platforms to reputational damage and potential regulatory scrutiny under GDPR for inadequate protection of personal data. The medium severity rating reflects moderate confidentiality and integrity impacts but no availability impact. European companies involved in the distribution, support, or integration of Petlibro devices may face increased support costs and liability risks. The lack of a patch increases the urgency for mitigation to prevent exploitation. Given the growing IoT market in Europe, widespread exploitation could have a notable cumulative effect on consumer security and privacy.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable endpoint /member/auth/thirdLogin through network-level controls such as IP whitelisting or rate limiting to reduce exposure. Organizations should monitor logs for suspicious authentication attempts involving arbitrary Google IDs or unusual usage patterns. Implementing multi-factor authentication (MFA) on user accounts, if supported by the platform, can add an additional layer of defense. Users should be advised to change their passwords and review account activity regularly. Petlibro should be engaged to prioritize development and deployment of a patch that properly validates OAuth tokens against the issuing authority before granting session tokens. Until a patch is available, organizations could consider disabling social login features or isolating affected devices on segmented networks to limit potential damage. Security teams should educate users on the risks of using social login and encourage use of direct authentication methods if available. Finally, integrating anomaly detection systems to flag unusual login behaviors can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-15115: Missing Authorization in Petlibrio Smart Pet Feeder Platform
Description
Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers can send requests to /member/auth/thirdLogin with arbitrary Google IDs and phoneBrand parameters to obtain full session tokens and account access without proper OAuth verification.
AI-Powered Analysis
Technical Analysis
CVE-2025-15115 identifies a critical security weakness in the Petlibro Smart Pet Feeder Platform's social login OAuth implementation. The vulnerability arises from improper validation of OAuth tokens during third-party authentication via Google accounts. Specifically, the endpoint /member/auth/thirdLogin accepts requests containing Google IDs and phoneBrand parameters without verifying the authenticity of the OAuth tokens. This flaw allows an attacker to impersonate any user by submitting arbitrary Google IDs, bypassing the intended authorization checks. Consequently, the attacker receives valid session tokens granting full access to the victim's account, including control over the smart pet feeder device and access to any personal data stored within the platform. The vulnerability affects all versions up to 1.7.31, with no patch currently available. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact on confidentiality and integrity (VC:L, VI:L), resulting in a medium severity rating of 6.9. No known exploits have been reported in the wild, but the ease of exploitation and potential for unauthorized access make this a significant threat to users. The flaw undermines the trust model of OAuth-based social login, a common authentication mechanism in IoT platforms, highlighting the importance of robust token validation. Given the increasing integration of IoT devices in consumer environments, exploitation could lead to privacy breaches and unauthorized device manipulation.
Potential Impact
For European organizations and consumers using the Petlibro Smart Pet Feeder Platform, this vulnerability could lead to unauthorized account takeovers without requiring any authentication or user interaction. Attackers gaining access to user accounts can manipulate device settings, potentially disrupting pet feeding schedules or causing device malfunctions. Additionally, attackers may access personal user information stored in the platform, leading to privacy violations. While the direct operational impact on critical infrastructure is low, the compromise of consumer IoT devices can erode user trust and expose organizations managing these platforms to reputational damage and potential regulatory scrutiny under GDPR for inadequate protection of personal data. The medium severity rating reflects moderate confidentiality and integrity impacts but no availability impact. European companies involved in the distribution, support, or integration of Petlibro devices may face increased support costs and liability risks. The lack of a patch increases the urgency for mitigation to prevent exploitation. Given the growing IoT market in Europe, widespread exploitation could have a notable cumulative effect on consumer security and privacy.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable endpoint /member/auth/thirdLogin through network-level controls such as IP whitelisting or rate limiting to reduce exposure. Organizations should monitor logs for suspicious authentication attempts involving arbitrary Google IDs or unusual usage patterns. Implementing multi-factor authentication (MFA) on user accounts, if supported by the platform, can add an additional layer of defense. Users should be advised to change their passwords and review account activity regularly. Petlibro should be engaged to prioritize development and deployment of a patch that properly validates OAuth tokens against the issuing authority before granting session tokens. Until a patch is available, organizations could consider disabling social login features or isolating affected devices on segmented networks to limit potential damage. Security teams should educate users on the risks of using social login and encourage use of direct authentication methods if available. Finally, integrating anomaly detection systems to flag unusual login behaviors can help detect exploitation attempts early.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-12-27T01:46:47.690Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6959a9dfdb813ff03e731c97
Added to database: 1/3/2026, 11:44:31 PM
Last enriched: 1/3/2026, 11:59:51 PM
Last updated: 1/7/2026, 4:13:04 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.